General

  • Target

    f6559e9de5695802ff471ea1769587e6f93aa9a3c1e29451b4b304886ca8489a_JC.exe

  • Size

    295KB

  • Sample

    231004-xt65pagd24

  • MD5

    1ea10b9fa4fba01caf0cc5c7fd27cf62

  • SHA1

    07d2db54a92bc6f15316c60989af5ead8d3b9db9

  • SHA256

    f6559e9de5695802ff471ea1769587e6f93aa9a3c1e29451b4b304886ca8489a

  • SHA512

    b36be2a063e6fd52a95ff77f48f1b83bd35e0bbdcbe9c6efc9f985723ec52d689337b0d1fee526dbbbe36c6c2ea5f0e2e760c0e5acd303237f809b2159264294

  • SSDEEP

    3072:G2hQqSvx/Ja8lVskJSJvQ1YpVpt8W5gLPgG2IA6wVkNVS:jhQ/vtJa8lqcMp6igLIG2VPe

Malware Config

Extracted

Family

stealc

C2

http://aidandylan.top

Attributes
  • url_path

    /3886d2276f6914c4.php

rc4.plain

Targets

    • Target

      f6559e9de5695802ff471ea1769587e6f93aa9a3c1e29451b4b304886ca8489a_JC.exe

    • Size

      295KB

    • MD5

      1ea10b9fa4fba01caf0cc5c7fd27cf62

    • SHA1

      07d2db54a92bc6f15316c60989af5ead8d3b9db9

    • SHA256

      f6559e9de5695802ff471ea1769587e6f93aa9a3c1e29451b4b304886ca8489a

    • SHA512

      b36be2a063e6fd52a95ff77f48f1b83bd35e0bbdcbe9c6efc9f985723ec52d689337b0d1fee526dbbbe36c6c2ea5f0e2e760c0e5acd303237f809b2159264294

    • SSDEEP

      3072:G2hQqSvx/Ja8lVskJSJvQ1YpVpt8W5gLPgG2IA6wVkNVS:jhQ/vtJa8lqcMp6igLIG2VPe

    • Stealc

      Stealc is an infostealer written in C++.

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks